Skip to content

Free 15-minute cybersecurity consultation — no obligation

Book Free Call
Taxtax54 min readDeep Dive

Two-Factor Authentication for Tax Software: Setup Guide

Complete guide to implementing two-factor authentication for tax software. Meet IRS Security Six requirements with Drake, Lacerte, ProSeries, CCH, and more.

Two-Factor Authentication for Tax Software: Setup Guide - two factor authentication tax software

Tax professionals handle some of the most sensitive data in business—Social Security numbers, financial records, bank account information, and personally identifiable information (PII) for thousands of clients. A single compromised login to your tax software can expose this data to cybercriminals, triggering costly data breaches, regulatory penalties, and irreparable damage to your firm's reputation.

Two-factor authentication for tax software is no longer optional. The IRS Security Six framework, outlined in Publication 4557, mandates that all tax professionals implement multi-factor authentication as a critical access control. This requirement applies whether you use Drake Tax, Lacerte, ProSeries, UltraTax CS, CCH Axcess, or any other professional tax preparation platform.

This guide provides the technical foundation and practical implementation steps you need to deploy two factor authentication tax software controls that meet IRS cybersecurity requirements while protecting your practice from the credential-based attacks that account for 85% of data breaches in 2026.

Two-Factor Authentication By The Numbers

$4.88M
Average Data Breach Cost

IBM Cost of Data Breach Report 2025

99.9%
Attack Prevention Rate

Microsoft Security Report 2025

85%
Breaches From Stolen Credentials

Verizon DBIR 2025

95%
Use Authenticator Apps

Enterprise MFA adoption rate

What Is Two-Factor Authentication and Why Is It Critical for IRS Security Six Compliance?

Two-factor authentication (2FA) is a security mechanism requiring users to provide two distinct authentication factors before gaining access to systems containing sensitive information. For tax professionals handling client data, implementing security six 2fa represents a foundational security control that dramatically reduces the risk of unauthorized access to tax preparation software and client records.

The Security Six framework, developed by the IRS and outlined in Publication 4557, identifies six essential cybersecurity controls that all tax preparers must implement to protect nonpublic personal information (NPPI). Two-factor authentication serves as the critical access control layer within this framework, working alongside antivirus protection, firewall security, secure backups, drive encryption, and VPN security to create defense-in-depth protection.

How Two-Factor Authentication Works

Authentication security relies on three distinct factor categories:

  • Something you know — Passwords, PINs, or security questions
  • Something you have — Physical tokens, smartphone apps, or smart cards
  • Something you are — Biometric identifiers like fingerprints or facial recognition

True two-factor authentication requires factors from two different categories. A password plus a security question does not constitute 2FA because both are "something you know." However, a password (something you know) combined with a code from a smartphone authenticator app (something you have) provides genuine multi-factor security.

According to NIST Special Publication 800-63-3, this combination achieves Authenticator Assurance Level 2 (AAL2), providing strong protection against credential theft, phishing attacks, and password database breaches that regularly compromise tax practices.

2026 IRS Compliance Requirement

All tax preparers handling nonpublic personal information must implement multi-factor authentication as part of their Written Information Security Plan (WISP) per IRS Publication 4557. Firms without compliant MFA controls face potential PTIN suspension and penalties up to $250,000 under FTC Safeguards Rule enforcement actions.

Understanding Two-Factor Authentication Methods for Tax Software

Not all two-factor authentication methods provide equal security. Tax professionals must understand the technical characteristics, security strengths, and implementation considerations for each authentication method to make informed decisions about protecting client data.

Time-Based One-Time Passwords (TOTP): The Industry Standard

Technical Specification: TOTP authentication uses the RFC 6238 standard to generate temporary codes through HMAC-based cryptographic functions. The algorithm combines a shared secret key with the current timestamp to produce a 6-8 digit code that remains valid for 30 seconds. Both the authentication server and client device independently generate the same code using synchronized time, enabling verification without transmitting the shared secret.

Security Characteristics: TOTP provides strong protection against credential theft because codes expire rapidly and cannot be reused. Unlike SMS-based codes, TOTP functions offline and is not vulnerable to telecommunication interception or SIM-swap attacks. However, TOTP remains susceptible to real-time phishing attacks where adversaries immediately use captured codes before expiration.

Popular TOTP Authenticator Apps:

  • Microsoft Authenticator — Integrates with Microsoft 365 accounts, supports push notifications, and provides password backup
  • Google Authenticator — Simple, widely supported, and works with most tax software platforms
  • Authy — Offers cloud backup and multi-device synchronization for practitioners who work across multiple computers
  • Duo Mobile — Enterprise-grade authentication with detailed audit logs and device health verification

Implementation Considerations: According to 2025 industry research, 95% of employees using MFA do so via software programs such as mobile authenticator apps, making TOTP the dominant enterprise authentication method. Successful deployment requires precise time synchronization—time drift exceeding a few seconds prevents code validation. Organizations should implement Network Time Protocol (NTP) to maintain accurate system clocks across all devices.

FIDO2 Hardware Security Keys: Maximum Phishing Protection

Technical Specification: FIDO2 (Fast Identity Online) authentication uses public-key cryptography where the hardware token stores a private key that never leaves the device. During authentication, the server sends a challenge that the token signs with its private key, and the server verifies the signature using the corresponding public key. This cryptographic approach eliminates shared secrets vulnerable to interception.

Security Characteristics: Hardware tokens provide the highest level of phishing resistance because they verify the authenticity of the login page through cryptographic domain binding. Attackers cannot trick users into authenticating to fraudulent sites because the token will only respond to challenges from registered domains. According to NIST SP 800-63-3, hardware authenticators offer Authenticator Assurance Level 3 (AAL3), the highest security designation available.

Recommended Hardware Tokens:

  • YubiKey 5 Series — USB-A and USB-C options, supports FIDO2, TOTP, and smart card protocols ($45-70 per key)
  • Google Titan Security Key — Affordable FIDO2-certified option with USB-A and NFC support ($30-35 per key)
  • Feitian ePass FIDO2 — Budget-friendly option for large deployments ($20-25 per key)

Implementation Considerations: Currently only 4% of employees utilize hardware security keys, primarily due to procurement costs and management complexity. However, entry-level FIDO2 keys cost $25-30 per user—minimal investment compared to breach costs averaging $4.88 million. Organizations should maintain an inventory tracking serial numbers and assigned users, with replacement procedures for lost or damaged tokens.

Authentication Method Security Comparison

FeatureSecurity LevelPhishing ResistanceCost Per UserBest For
TOTP Authenticator Apps
FIDO2 Hardware Keys
SMS Text Codes
Push Notifications

Key Takeaway

TOTP authenticator apps provide the optimal balance of security and usability for most tax practices. Deploy Microsoft Authenticator or Google Authenticator firm-wide as your baseline, and implement FIDO2 hardware security keys for administrator accounts and users with access to sensitive financial systems. Avoid SMS-based authentication, which NIST has deprecated due to interception vulnerabilities.

Tax Software-Specific 2FA Setup: Platform-by-Platform Guide

Each major tax preparation software platform implements two-factor authentication differently. Understanding platform-specific configuration ensures successful deployment across your technology environment.

Drake Tax Software 2FA Configuration

Drake Tax supports 2FA through integration with Microsoft Authenticator and Google Authenticator apps. To enable two factor authentication tax software protection in Drake:

  1. Navigate to Setup → Security → User Security in Drake Tax
  2. Select the user account and enable "Require Multi-Factor Authentication"
  3. Users will receive a QR code during their next login to pair their authenticator app
  4. Drake generates a unique secret key for each user—store backup codes securely in case of device loss

Drake Tax also supports hardware security keys for administrator accounts through FIDO2 protocol when accessing Drake Cloud services.

Lacerte and ProSeries 2FA Implementation

Intuit's professional tax software platforms (Lacerte and ProSeries) use Intuit Account authentication, which supports multiple 2FA methods:

  • Intuit Authenticator app — Primary method with push notification support
  • Third-party TOTP apps — Google Authenticator, Microsoft Authenticator, or Authy
  • Security key authentication — YubiKey and other FIDO2-certified hardware tokens

Enable 2FA by logging into your Intuit Account settings at accounts.intuit.com, selecting Security, and choosing "Two-step verification." All users with Intuit Account access must individually enable 2FA—administrators cannot enforce it centrally without Intuit practice management tools.

CCH Axcess and UltraTax CS Authentication

Wolters Kluwer's CCH platforms implement 2FA through their Axcess Portal identity management:

  1. Navigate to User Settings → Security Settings
  2. Enable "Multi-Factor Authentication" and select your preferred method
  3. Supports authenticator apps, hardware tokens, and biometric authentication on compatible devices

CCH Axcess administrators can enforce 2FA requirements for all users through the Admin Portal under Security Policies, ensuring consistent protection across the firm.

Thomson Reuters UltraTax CS and GoSystem

Thomson Reuters platforms support 2FA through their CSIdentity authentication system. Configuration steps:

  1. Access the Admin Console → Security Settings
  2. Enable "Require Multi-Factor Authentication for All Users"
  3. Users configure their 2FA method during next login
  4. Supports TOTP apps, SMS (not recommended), and hardware security keys

Thomson Reuters also offers single sign-on (SSO) integration with identity providers like Microsoft Entra ID (formerly Azure AD), allowing centralized 2FA management across all firm applications.

Enterprise 2FA Implementation Process for Tax Practices

1

Security Assessment & Planning

Inventory all systems containing taxpayer data (tax software, document management, client portals, email). Identify privileged accounts requiring hardware tokens. Document current authentication methods and gaps.

2

Method Selection & Procurement

Select standardized authenticator apps (Microsoft or Google Authenticator) for firm-wide deployment. Purchase FIDO2 hardware security keys for administrators and privileged accounts. Plan for 10% spare inventory for replacements.

3

Technical Configuration

Enable 2FA in tax software administrative settings. Configure time synchronization via NTP across all systems. Set up account recovery procedures and generate backup codes. Configure authentication logging for compliance monitoring.

4

Pilot Deployment

Deploy 2FA to IT staff and firm leadership first for testing. Validate authentication workflows across all critical systems. Identify and resolve technical issues before broader rollout. Document configuration steps and troubleshooting procedures.

5

User Training & Communication

Conduct hands-on training sessions demonstrating enrollment and daily usage. Provide written guides with screenshots for each platform. Emphasize personal security benefits, not just compliance mandates. Establish help desk support during rollout period.

6

Phased Rollout & Monitoring

Complete firm-wide enrollment at least 30 days before tax season. Review authentication logs weekly to identify enrollment gaps and failed attempts. Track adoption metrics and address resistance proactively. Enforce compliance deadlines with manager follow-up.

7

Documentation & Maintenance

Document 2FA implementation in your Written Information Security Plan (WISP). Schedule annual security awareness training refreshers. Maintain hardware token inventory with tracking system. Review and update authentication policies annually.

Advanced Security Six 2FA Strategies and Emerging Technologies

As authentication technology evolves, tax practices implementing security six 2fa should prepare for emerging approaches that will shape the next generation of access control. Understanding these advanced strategies enables organizations to build forward-compatible authentication architectures.

Passwordless Authentication: Eliminating Password Vulnerabilities

The authentication industry is transitioning toward eliminating passwords entirely. Passwordless systems use biometrics or hardware tokens as the sole authentication factor, completely removing password vulnerabilities from the attack surface. According to industry projections, passwordless authentication will achieve mainstream enterprise adoption by 2026-2027.

Modern passwordless implementations use FIDO2 protocol where hardware security keys or platform authenticators (Windows Hello, Touch ID) perform cryptographic operations without passwords. During account registration, the device generates a unique cryptographic key pair—the private key remains on the device while the public key is registered with the server. Authentication consists of the server sending a challenge that the device signs with its private key, proving possession without transmitting secrets.

For tax practices, passwordless authentication offers significant security advantages by eliminating password-based attack vectors including credential stuffing, password spraying, and phishing campaigns. Microsoft Entra ID (Azure AD) and Google Workspace both support passwordless authentication for business applications, enabling tax firms to eliminate passwords while maintaining compliance with IRS WISP requirements.

Risk-Based Adaptive Authentication

Modern authentication systems incorporate machine learning algorithms that assess risk continuously and adjust authentication requirements dynamically. By 2026, 40% of MFA solutions are expected to use AI-driven behavioral analytics to detect anomalies in user behavior patterns.

Adaptive authentication evaluates contextual factors including:

  • Device recognition — Identifying trusted devices through digital fingerprinting
  • Location analysis — Flagging authentication attempts from unusual geographic locations or VPN exit nodes
  • Time patterns — Detecting after-hours access or impossible travel scenarios
  • Behavioral biometrics — Analyzing keystroke dynamics and mouse movement patterns
  • Access patterns — Identifying unusual file access or privilege escalation attempts

This approach balances security with usability by applying stronger authentication only when risk indicators suggest potential compromise. Low-risk scenarios might require only biometric authentication, medium-risk scenarios demand password plus TOTP, and high-risk scenarios trigger hardware token requirements plus manager approval workflows.

Leading platforms including Microsoft Entra ID Conditional Access, Duo Beyond, and Okta Adaptive MFA provide risk-based authentication for tax software environments, enabling practices to implement sophisticated threat detection without impacting legitimate user workflows.

Tax Practice 2FA Implementation Checklist

  • Item
  • Item
  • Item
  • Item
  • Item
  • Item
  • Item
  • Item
  • Item
  • Item
  • Item
  • Item
  • Item
  • Item

Common Security Six 2FA Implementation Challenges and Solutions

Tax practices deploying two-factor authentication encounter predictable challenges that can delay implementation or reduce effectiveness. Understanding these challenges and proven solutions enables organizations to anticipate issues and implement appropriate mitigation strategies.

User Resistance and Adoption Barriers

Challenge: Research indicates that 49% of organizations cite poor user experience as a barrier to MFA adoption. Users perceive authentication as friction that slows workflow, particularly when required multiple times daily. Resistance manifests as workarounds (storing credentials insecurely), help desk complaints, or simple non-compliance with enrollment deadlines.

Solution: Address resistance through comprehensive communication emphasizing personal benefits rather than compliance mandates. Demonstrate how 2FA protects users' personal accounts and identity, not just organizational data. Implement adaptive authentication that reduces prompts for trusted devices and low-risk scenarios. Provide multiple authentication method options allowing users to select approaches that fit their workflow—some users prefer hardware tokens while others favor mobile apps.

Establish executive sponsorship with visible participation from leadership demonstrating organizational commitment. When partners and firm owners actively use 2FA and discuss its importance, staff adoption increases significantly. Schedule hands-on training sessions where users complete enrollment with IT support present to troubleshoot issues immediately.

Legacy System Integration

Challenge: Tax practices operate heterogeneous technology environments including legacy applications that lack native 2FA support. Some systems use proprietary authentication protocols incompatible with modern identity providers, while others require expensive upgrades to enable MFA functionality. Document management systems, legacy tax software versions, and custom applications frequently lack 2FA capabilities.

Solution: Deploy authentication proxy solutions that intercept and enhance authentication for legacy applications. Products like identity provider Access Gateway, Azure Application Proxy, or identity provider Application Gateway insert 2FA requirements before legacy systems without modifying application code. For systems requiring direct network access, enforce 2FA at the VPN or zero-trust network access (ZTNA) layer, ensuring authentication occurs before any legacy system connectivity.

Schedule application modernization or replacement for systems with no viable 2FA integration path—legacy systems that cannot support modern authentication represent unacceptable security risks in 2026. When evaluating new tax software or document management platforms, verify native 2FA support as a mandatory requirement before purchase.

Mobile Device Management and BYOD Policies

Challenge: Many tax professionals use personal smartphones for authenticator apps, creating security and support challenges. When employees leave the firm, change phone numbers, or lose devices, authentication recovery becomes complex. Personal devices may lack security controls, potentially compromising authentication factors.

Solution: Implement mobile device management (MDM) or mobile application management (MAM) solutions that enforce security policies on devices with authenticator apps. Require device passcodes, enable remote wipe capabilities, and verify devices run current operating system versions. For practices with strict security requirements, provide firm-owned devices specifically for authentication purposes.

Alternatively, consider hardware security keys for all staff instead of relying on personal smartphones. At $25-30 per user, hardware tokens eliminate BYOD complexities while providing superior security. Users can carry hardware keys on keychains, eliminating phone dependence and simplifying device replacement procedures.

Client Portal Access and Third-Party Integration

Challenge: Tax practices use numerous third-party platforms including client portals, e-signature services, document sharing platforms, and payment processors. Each platform implements 2FA differently, creating configuration complexity and inconsistent user experiences. Some platforms may not support 2FA at all, creating security gaps.

Solution: Implement single sign-on (SSO) with centralized 2FA through an identity provider like Microsoft Entra ID, Google Workspace, or Okta. SSO allows users to authenticate once with 2FA and access all connected applications without repeated authentication prompts. This approach centralizes security control, simplifies user experience, and provides comprehensive audit logging across all platforms.

For critical third-party services that lack SSO support, evaluate alternative vendors that provide modern authentication capabilities. Security should be a primary vendor selection criterion—platforms handling taxpayer data must support industry-standard authentication protocols including SAML, OAuth 2.0, or OIDC.

Need Help With Security Six Compliance?

Our cybersecurity specialists have helped over 4,000 tax professionals implement IRS-compliant two-factor authentication and complete Written Information Security Plans.

Building Comprehensive Security Beyond Two-Factor Authentication

Two-factor authentication represents the single most effective security control tax practices can implement to prevent credential-based attacks. However, 2FA alone does not constitute comprehensive security for tax practices handling sensitive client data.

Defense-in-Depth Security Architecture

Comprehensive protection requires implementing all Security Six controls identified in IRS Publication 4557:

  • Multi-factor authentication — Prevents unauthorized access even when passwords are compromised
  • Endpoint Detection and Response (EDR) — Detects and blocks malware, ransomware, and advanced persistent threats
  • Firewall protection — Controls network traffic and prevents unauthorized access to internal systems
  • Encrypted data backups — Enables recovery from ransomware attacks and system failures
  • Drive encryption — Protects data on lost or stolen devices through full-disk encryption
  • Virtual Private Network (VPN) — Secures remote access and encrypts data transmission over public networks

According to threat intelligence on cyberattacks targeting tax firms, attackers use multiple attack vectors. Organizations must implement layered controls where no single control failure results in breach. 2FA prevents credential theft, EDR blocks malware execution, backups enable recovery, and encryption protects data confidentiality—each control addresses different attack scenarios.

Supplementary Security Controls for Tax Practices

Beyond Security Six, mature tax practices implement additional controls including:

  • Security awareness training — Reduces phishing susceptibility and improves threat recognition
  • Patch management — Eliminates known vulnerabilities in operating systems and applications
  • Privileged access management — Controls and monitors administrative access to critical systems
  • Security information and event management (SIEM) — Provides centralized logging and threat detection
  • Incident response planning — Establishes procedures for detecting, containing, and recovering from security incidents
  • Penetration testing — Validates security controls through simulated attacks

These supplementary controls create layered protection that addresses the full spectrum of threats facing tax practices in 2026. While 2FA prevents unauthorized access, security awareness training prevents users from falling victim to social engineering attacks, and incident response planning ensures rapid containment when incidents occur.

Integration with Written Information Security Plans (WISP)

IRS Publication 4557 requires all tax preparers to maintain a Written Information Security Plan (WISP) documenting security policies and procedures. Your WISP must specifically address:

  • Multi-factor authentication requirements for all users accessing taxpayer data
  • Authentication method standards (TOTP apps, hardware keys, etc.)
  • Account recovery procedures for lost or compromised authentication devices
  • Monitoring and compliance verification processes
  • User training requirements and documentation

Document your 2FA implementation thoroughly, including configuration screenshots, enrollment completion rates, and authentication log review procedures. During IRS audits or PTIN renewal security reviews, you must demonstrate not just that 2FA exists, but that it's properly configured, actively monitored, and universally enforced across your practice.

The Bottom Line on 2FA for Tax Practices

The implementation imperative is clear: two factor authentication tax software controls represent the single most effective security investment tax practices can make to protect client data, maintain IRS compliance, and prevent the credential-based attacks responsible for 85% of data breaches targeting professional service firms in 2026. Microsoft research demonstrates that MFA blocks 99.9% of account compromise attacks—no other single control delivers comparable risk reduction at such low cost.

Protect Your Tax Practice with Expert Cybersecurity

Our cybersecurity specialists have helped over 4,000 tax professionals implement IRS-compliant security controls including two-factor authentication, endpoint protection, and comprehensive WISP development. Schedule a free consultation to evaluate your current security posture and receive actionable recommendations.

Frequently Asked Questions About Two-Factor Authentication for Tax Software

Two-factor authentication (2FA) is a security control that requires users to provide two different authentication factors before accessing systems. For tax preparers, 2FA is mandated by the IRS Security Six framework in Publication 4557 as a critical protection for taxpayer data. 2FA prevents 99.9% of credential-based attacks, which account for 85% of data breaches. Without 2FA, a stolen password provides complete access to all client tax records, Social Security numbers, and financial data.

All major professional tax preparation platforms support 2FA: Drake Tax (via Microsoft/Google Authenticator), Intuit Lacerte and ProSeries (via Intuit Account 2FA), CCH Axcess and UltraTax CS (via Axcess Portal), and Thomson Reuters UltraTax CS/GoSystem (via CSIdentity). Most platforms support TOTP authenticator apps, and many also support FIDO2 hardware security keys for administrator accounts. If your tax software doesn't support 2FA natively, enforce it at the VPN or network access layer.

TOTP authenticator apps (like Microsoft Authenticator or Google Authenticator) generate time-based codes on your smartphone, providing strong security at zero cost. They achieve NIST AAL2 security level and work for 95% of use cases. Hardware security keys (like YubiKey) are physical tokens using cryptographic authentication, providing maximum phishing resistance at AAL3 security level. Hardware keys cost $25-70 per user but offer superior protection for administrator accounts and privileged users. Most tax practices deploy TOTP apps firm-wide with hardware keys for admins.

Establish account recovery procedures before deploying 2FA. Most platforms provide backup codes during enrollment—print and store these securely (not digitally). Hardware security keys should be purchased in pairs, with one stored securely as backup. Administrators should maintain recovery access through alternate authentication methods. For TOTP apps, Authy offers cloud backup and multi-device sync, though this reduces security slightly. Document your recovery procedures in your WISP and test them annually to ensure they work when needed.

No. NIST deprecated SMS authentication in SP 800-63-3 due to vulnerabilities including SIM-swap attacks, SS7 protocol interception, and message forwarding. The IRS Security Six framework requires strong authentication methods—SMS provides only AAL1 security. Tax practices should use TOTP authenticator apps (AAL2) or FIDO2 hardware security keys (AAL3). If your current tax software only offers SMS 2FA, supplement it with VPN-layer authentication using stronger methods, or migrate to platforms with modern authentication support.

TOTP authenticator apps are free—Microsoft Authenticator and Google Authenticator cost nothing to deploy. Users install the app on existing smartphones at zero cost. FIDO2 hardware security keys cost $25-70 per user depending on model (YubiKey 5, Google Titan, or Feitian ePass). For a 10-person firm using free TOTP apps for staff and $50 hardware keys for 2 admins, total cost is $100—negligible compared to the $4.88 million average breach cost. Implementation time typically requires 2-4 hours for technical configuration plus 30 minutes per user for training and enrollment.

Enforcement capabilities vary by platform. CCH Axcess, Thomson Reuters, and Drake Tax allow administrators to enforce 2FA requirements for all users through central policies. Intuit Lacerte/ProSeries requires users to enable 2FA individually on their Intuit Accounts unless you use Intuit practice management tools. For platforms without central enforcement, implement organizational policies requiring 2FA, verify compliance through authentication logs, and enforce through access reviews. SSO integration with Microsoft Entra ID or Okta provides centralized 2FA enforcement across all applications regardless of individual platform capabilities.

No. 2FA specifically prevents credential-based attacks including password theft, phishing, and brute-force attacks—which account for 85% of breaches. However, 2FA doesn't protect against malware infections, ransomware, social engineering that bypasses authentication, or physical device theft without encryption. This is why IRS Publication 4557 requires all six Security Six controls: 2FA, antivirus/EDR, firewalls, backups, drive encryption, and VPN. Comprehensive protection requires defense-in-depth with multiple layered controls addressing different attack vectors.

Authentication frequency depends on your platform configuration and session management policies. Most tax software maintains sessions for 8-12 hours, requiring 2FA only once daily per device. Adaptive authentication reduces prompts for trusted devices and locations. However, high-risk actions (accessing tax returns, changing settings, or administrative functions) may trigger step-up authentication requiring fresh 2FA verification. Balance security with usability—excessive authentication prompts drive workarounds and reduce compliance. Configure session timeouts based on risk: 8 hours for standard users, 4 hours for privileged accounts, and require re-authentication for sensitive operations.

Your Written Information Security Plan must document: (1) Multi-factor authentication requirements for all systems containing taxpayer data, (2) Approved authentication methods and security standards (TOTP apps, hardware keys, prohibited methods like SMS), (3) User enrollment procedures and training requirements, (4) Account recovery processes for lost devices, (5) Monitoring and compliance verification procedures, (6) Exceptions and compensating controls for systems without 2FA support. Include configuration screenshots, enrollment completion metrics, and authentication log review schedules. Update your WISP annually and after any significant authentication system changes. During PTIN renewal reviews, you must demonstrate active enforcement, not just policy documentation.

Share

Share on X
Share on LinkedIn
Share on Facebook
Send via Email
Copy URL
(800) 492-6076
Share

Schedule

Need help with IRS compliance?

Our tax cybersecurity specialists can review your security posture and help you get compliant.

Protect your tax practice from cyber threats

Schedule a free consultation to assess your firm's security posture.